Information | Absolute Software | Protect & Manage IT assets, protect data and even locate missing computers. | Manage IT assets, protect data and even locate missing computers. |
Information | Information Security and Multi-Compliance | Experienced managers typically do not want to be held accountable for situations where they have little control or influence. However, this is not an unusual scenario for information security managers. | Avoiding Audit Fatigue with a Single IT Compliance Strategy |
Information | Security Goes Virtual | Establishing appropriate safeguards has always been recognized as an important part of data processing. Whether in terms of controlling different levels of user access, or in terms of protecting corporate information from outside threats, computer security features have always been part of the picture. | Security Goes Virtual |
Information | 10 Most Influential People in Government Cybersecurity for 2010 | To successfully secure government IT, the proper guidance, laws and policies must be put in place, and that requires special leadership. | The Influencers |
Information | Information Security Career Predictions | Information security is the hot career option for professionals in 2010 and beyond. | David Foote on What's Hot and Why |
Information | 6 hottest skills for 2010 | A slowly reviving economy will have organizations hiring in a few key areas, looking for IT pros with a mix of skills | 6 hottest skills for 2010 - ComputerWorld |
Question | What is the purpose of a Faraday cage? | To mitigate data emanation & To prevent interference. A Faraday cage is designed to mitigate data emanation and also prevents EMI/RFI from entering the enclosures. Network intrusion detection systems (NIDS) would be used to detect network attacks, and host-based intrusion detection systems (HIDS) would be used to detect attacks on a host. | Purpose of a Faraday Cage |
Information | IT Governance as defined by Andrew Clifford (Director, Minimal IT) | We apply governance to IT investments, change projects and service delivery. Extending governance to include the systems themselves can give us the management tool we need to overcome many persistent problems in IT. Read more on the link. | What is IT governance? |
Information | Name the drivers to implement IT governance infrastructures. | Organizations today are subject to many regulations governing data retention, confidential information, financial accountability and recovery from disasters. While none of these regulations requires an IT governance framework, many have found it to be an excellent way to ensure regulatory compliance. By implementing IT governance, you’ll have the internal controls you need to meet the core guidelines of many of these regulations, such as the Sarbanes-Oxley Act of 2002. | Drivers to implement IT Governance |
Question | Is it something every organization needs? | Every organization—large and small, public and private—needs a way to ensure that the IT function sustains the organization’s strategies and objectives. The level of sophistication you apply to IT governance, however, may vary according to size, industry or applicable regulations. In general, the larger and more regulated the organization, the more detailed the IT governance structure should be. | Who needs IT Governance ? |
Information | What is IT Governance ? | Simply put, it’s putting structure around how organizations align IT strategy with business strategy, ensuring that companies stay on track to achieve their strategies and goals, and implementing good ways to measure IT’s performance. It makes sure that all stakeholders’ interests are taken into account and that processes provide measurable results. An IT governance framework should answer some key questions, such as how the IT department is functioning overall, what key metrics management needs and what return IT is giving back to the business from the investment it’s making. | IT Governance Definition |